Sciweavers

7961 search results - page 1197 / 1593
» Data Integration with Uncertainty
Sort
View
MATA
2004
Springer
149views Communications» more  MATA 2004»
15 years 10 months ago
Detecting and Proving Manipulation Attacks in Mobile Agent Systems
Mobile agents are software entities consisting of code, data and state that can migrate autonomously from host to host executing their code. Unfortunately, security issues restrict...
Oscar Esparza, Miguel Soriano, Jose L. Muño...
MCS
2004
Springer
15 years 10 months ago
Multiple Classifiers System for Reducing Influences of Atypical Observations
Atypical observations, which are called outliers, are one of difficulties to apply standard Gaussian density based pattern classification methods. Large number of outliers makes di...
Sarunas Raudys, Masakazu Iwamura
VLDB
2004
ACM
144views Database» more  VLDB 2004»
15 years 10 months ago
Returning Modified Rows - SELECT Statements with Side Effects
SQL in the IBM® DB2® Universal Database™ for Linux®, UNIX®, and Windows® (DB2 UDB) database management product has been extended to support nested INSERT, UPDATE, and DELET...
Andreas Behm, Serge Rielau, Richard Swagerman
119
Voted
VLDB
2004
ACM
105views Database» more  VLDB 2004»
15 years 10 months ago
Tamper Detection in Audit Logs
Audit logs are considered good practice for business systems, and are required by federal regulations for secure systems, drug approval data, medical information disclosure, fina...
Richard T. Snodgrass, Shilong (Stanley) Yao, Chris...
VLDB
2004
ACM
126views Database» more  VLDB 2004»
15 years 10 months ago
Instance-based Schema Matching for Web Databases by Domain-specific Query Probing
In a Web database that dynamically provides information in response to user queries, two distinct schemas, interface schema (the schema users can query) and result schema (the sch...
Jiying Wang, Ji-Rong Wen, Frederick H. Lochovsky, ...
« Prev « First page 1197 / 1593 Last » Next »